Emerging Technology and Innovation Topic | Assignment
Added on 2022-09-13
10 Pages1570 Words12 Views
Running head: PROJECT MANAGEMENT
Emerging technology and innovation topic
Name of the Student
Name of the University
Author’s Note
Emerging technology and innovation topic
Name of the Student
Name of the University
Author’s Note
PROJECT MANAGEMENT
1
Table of Contents
1. Rationale......................................................................................................................................2
1.1 Problem domain.....................................................................................................................2
1.2 Purpose and justification........................................................................................................2
2. Supervisor approval.....................................................................................................................3
3. Research Questions......................................................................................................................3
4. Conceptual or theoretical framework..........................................................................................3
5. Methodology................................................................................................................................4
5.1 Analysis of sources of information........................................................................................4
5.2 Research methods..................................................................................................................4
5.3 Data collection.......................................................................................................................4
5.4 Ethical issues.........................................................................................................................4
5.5 Compliance requirements......................................................................................................5
6. Project plan.................................................................................................................................5
6.1 Deliverables...........................................................................................................................5
6.2 WBS.......................................................................................................................................5
6.3 Risk analysis..........................................................................................................................6
6.4 Duration.................................................................................................................................7
6.5 Gantt chart.............................................................................................................................7
Bibliography....................................................................................................................................8
1
Table of Contents
1. Rationale......................................................................................................................................2
1.1 Problem domain.....................................................................................................................2
1.2 Purpose and justification........................................................................................................2
2. Supervisor approval.....................................................................................................................3
3. Research Questions......................................................................................................................3
4. Conceptual or theoretical framework..........................................................................................3
5. Methodology................................................................................................................................4
5.1 Analysis of sources of information........................................................................................4
5.2 Research methods..................................................................................................................4
5.3 Data collection.......................................................................................................................4
5.4 Ethical issues.........................................................................................................................4
5.5 Compliance requirements......................................................................................................5
6. Project plan.................................................................................................................................5
6.1 Deliverables...........................................................................................................................5
6.2 WBS.......................................................................................................................................5
6.3 Risk analysis..........................................................................................................................6
6.4 Duration.................................................................................................................................7
6.5 Gantt chart.............................................................................................................................7
Bibliography....................................................................................................................................8
PROJECT MANAGEMENT
2
1. Rationale
1.1 Problem domain
The security aspect is considered as one of the significant concerns that mainly occurs
due to continuous exchange of various types of sensitive as well as confidential data. It is found
that big data mainly uses large sets of data and therefore hacking of information or data can
create huge loss (Terzi, Terzi & Sagiroglu, 2015). It is found that the data that is stored within
the storage medium including transaction logs as well as other confidential information generally
have varying levels. When data transfer take place then the size of the data gets increased and
both the availability as well as scalability makes auto-tiering important and therefore new
challenges are posed to big data storage. In addition to this, challenges like vulnerability to fake
generation of data as well as trouble in cryptographic protection also occurs.
1.2 Purpose and justification
The main purpose of the project is to utilize blockchain technology for resolving the
security and privacy issues which occur due to the use of Big data. It is found that blockchain has
brough a new way of properly managing as well as operating big data in a central perspective
where all the types of data are generally brought together in a very much centralized way. In
addition to this, it is found that Blockchain generally integrates with other types of advanced
technologies like cloud, AI as well as IoT. Moreover, data that is generated through blockchain
act as a boost for big data for successful data integrity as blockchain helps in ascertaining the
origin of data.
2
1. Rationale
1.1 Problem domain
The security aspect is considered as one of the significant concerns that mainly occurs
due to continuous exchange of various types of sensitive as well as confidential data. It is found
that big data mainly uses large sets of data and therefore hacking of information or data can
create huge loss (Terzi, Terzi & Sagiroglu, 2015). It is found that the data that is stored within
the storage medium including transaction logs as well as other confidential information generally
have varying levels. When data transfer take place then the size of the data gets increased and
both the availability as well as scalability makes auto-tiering important and therefore new
challenges are posed to big data storage. In addition to this, challenges like vulnerability to fake
generation of data as well as trouble in cryptographic protection also occurs.
1.2 Purpose and justification
The main purpose of the project is to utilize blockchain technology for resolving the
security and privacy issues which occur due to the use of Big data. It is found that blockchain has
brough a new way of properly managing as well as operating big data in a central perspective
where all the types of data are generally brought together in a very much centralized way. In
addition to this, it is found that Blockchain generally integrates with other types of advanced
technologies like cloud, AI as well as IoT. Moreover, data that is generated through blockchain
act as a boost for big data for successful data integrity as blockchain helps in ascertaining the
origin of data.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Assignment | Project Proposal and Planlg...
|7
|1830
|16
Shane’s IOT Greenhouse projectlg...
|14
|2266
|334
ITC571 Emerging Technologies and Innovationlg...
|14
|2070
|25
Use of Big Data for Governmentlg...
|10
|1649
|159
Emerging Technology And Innovation | Assessmentlg...
|15
|2340
|19
Project Proposal and Plan, Cloud Security - ITC 568lg...
|12
|2096
|1387